|
| 1 | +import { describe, expect, it } from 'vitest' |
| 2 | +import { sanitizeInput, validateEmail, validatePassword } from './validation' |
| 3 | + |
| 4 | +describe('sanitizeInput', () => { |
| 5 | + it('removes angle brackets and javascript protocol patterns', () => { |
| 6 | + const scriptProtocol = `java${'script:'}` |
| 7 | + const dirty = ` <script>alert(1)</script> ${scriptProtocol}evil() ` |
| 8 | + const sanitized = sanitizeInput(dirty) |
| 9 | + |
| 10 | + expect(sanitized).not.toContain('<') |
| 11 | + expect(sanitized).not.toContain('>') |
| 12 | + expect(sanitized.toLowerCase()).not.toContain(scriptProtocol) |
| 13 | + }) |
| 14 | + |
| 15 | + it('returns an empty string for non-string values', () => { |
| 16 | + expect(sanitizeInput(123 as unknown as string)).toBe('') |
| 17 | + }) |
| 18 | +}) |
| 19 | + |
| 20 | +describe('validateEmail', () => { |
| 21 | + it('accepts valid emails', () => { |
| 22 | + expect(validateEmail('user@example.gov')).toBe(true) |
| 23 | + }) |
| 24 | + |
| 25 | + it('rejects malformed emails', () => { |
| 26 | + expect(validateEmail('invalid-email')).toBe(false) |
| 27 | + expect(validateEmail('missing-domain@')).toBe(false) |
| 28 | + }) |
| 29 | +}) |
| 30 | + |
| 31 | +describe('validatePassword', () => { |
| 32 | + it('marks a weak password as invalid', () => { |
| 33 | + const result = validatePassword('weak') |
| 34 | + expect(result.isValid).toBe(false) |
| 35 | + expect(result.strength).toBe('weak') |
| 36 | + expect(result.errors.length).toBeGreaterThan(0) |
| 37 | + }) |
| 38 | + |
| 39 | + it('marks a strong password as valid', () => { |
| 40 | + const result = validatePassword('StrongPass123!') |
| 41 | + expect(result.isValid).toBe(true) |
| 42 | + expect(result.strength).toBe('strong') |
| 43 | + expect(result.errors).toEqual([]) |
| 44 | + }) |
| 45 | +}) |
0 commit comments